![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.66538 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Security Advisory RHSA-2009:1680 |
Resumen: | The remote host is missing updates announced in;advisory RHSA-2009:1680.;;Xpdf is an X Window System based viewer for Portable Document Format (PDF);files.;;Petr Gajdos and Christian Kornacker of SUSE reported a buffer overflow flaw;in Xpdf's Type 1 font parser. A specially-crafted PDF file with an embedded;Type 1 font could cause Xpdf to crash or, possibly, execute arbitrary code;when opened. (CVE-2009-4035);;Users are advised to upgrade to this updated package, which contains a;backported patch to correct this issue. |
Descripción: | Summary: The remote host is missing updates announced in advisory RHSA-2009:1680. Xpdf is an X Window System based viewer for Portable Document Format (PDF) files. Petr Gajdos and Christian Kornacker of SUSE reported a buffer overflow flaw in Xpdf's Type 1 font parser. A specially-crafted PDF file with an embedded Type 1 font could cause Xpdf to crash or, possibly, execute arbitrary code when opened. (CVE-2009-4035) Users are advised to upgrade to this updated package, which contains a backported patch to correct this issue. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-4035 1023356 http://www.securitytracker.com/id?1023356 37350 http://www.securityfocus.com/bid/37350 37641 http://secunia.com/advisories/37641 37781 http://secunia.com/advisories/37781 37787 http://secunia.com/advisories/37787 37793 http://secunia.com/advisories/37793 ADV-2009-3555 http://www.vupen.com/english/advisories/2009/3555 RHSA-2009:1680 http://www.redhat.com/support/errata/RHSA-2009-1680.html RHSA-2009:1681 http://www.redhat.com/support/errata/RHSA-2009-1681.html RHSA-2009:1682 http://www.redhat.com/support/errata/RHSA-2009-1682.html SUSE-SR:2010:003 http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html http://cgit.freedesktop.org/poppler/poppler/diff/fofi/FoFiType1.cc?id=4b4fc5c0 http://cgit.freedesktop.org/poppler/poppler/tree/fofi/FoFiType1.cc?id=4b4fc5c017bf147c9069bbce32fc14467bd2a81a https://bugzilla.redhat.com/show_bug.cgi?id=541614 oval:org.mitre.oval:def:10996 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10996 xpdf-fofitype1parse-bo(54831) https://exchange.xforce.ibmcloud.com/vulnerabilities/54831 |
Copyright | Copyright (C) 2009 E-Soft Inc. |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |